Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
12.12 References
“FAQ: Network Intrusion Detection Systems.” http://www.robertgraham.com/pubs/network-intrusion-detection.html
Sundaram, Aurobindo. “An Introduction to Intrusion Detection,” ACM Crossroads: Student Magazine. Electronic Publication. http://www.acm.org/crossroads/xrds2-4/intrus.html
Handley, Mark, Vern Paxson and Christian Kreibich. “Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics.” http://www.icir.org/vern/papers/norm-usenix-sec-01-html/norm.html
Mullins, Michael. “Implementing a network intrusion detection system.” 16 May 2002. http://www.zdnet.com.au/itmanager/technology/story/0,2000029587,20265285,00.htm
Central Texas LAN Association “Network-vs Host-Based Intrusion Detection.” http://www.ctla.org/newsletter/1999/0999nl.pdf.
Innella, Paul. “The Evolution of Intrusion Detection Systems.” Tetrad Digital Integrity, LC. http://www.securityfocus.com/infocus/1514
Kizza, Joseph Migga. Computer Network Security and Cyber Ethics. McFarlans Publishers, Jefferson, NC: 2002.
Bauer, Kenneth, R. “AINT Misbehaving: A Taxonomy of Anti-Intrusion Techniques.” (http://www.sans.org/newlook/resources/IDFQA/aint.htm).
Proctor, Paul. The Practical Intrusion Detection Handbook. Upper Saddle River, NJ: Prentice Hall, 2001.
Fink, G.A, B.L. Chappell, T.G. Turner, and K.F. O'Donoghue. “a Metric-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems.” Proceedings of WPDRTS, April 15–17, 2002, Fort Lauderdale, FL.
Yee, Andre. “Network Intrusions: From Detection to Prevention.” International Journal of Information Assurance Professionals, Vol. 8, Issue 1, February 2003.
Panko, Raymond, R. Corporate Computer and Network Security. Upper Saddle River, NJ: Prentice Hall, 2004.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). System Intrusion Detection and Prevention. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_12
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)